Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer theory
biblio
Trust-based Incentive for Mobile Offloaders in Opportunistic Networks
Submitted by grigby1 on Tue, 07/27/2021 - 12:06pm
Base stations
computer science
computer theory
Conferences
Data offloading
data traffic
Human behavior
incentive
Mobile handsets
Nash Equilibrium
Opportunistic Networks
pubcrawl
Relays
Target set selection
trust
Wireless fidelity
biblio
A Hybrid Algorithm for Evaluating Trust in Online Social Networks
Submitted by grigby1 on Tue, 07/27/2021 - 12:06pm
Computational modeling
computer theory
graph theory
Human behavior
learning
learning automata
Measurement
online social network
Power capacitors
pubcrawl
Reliability
security
social networking (online)
trust
trust evaluation
Trusted paths
biblio
Trust-Region Minimization Algorithm for Training Responses (TRMinATR): The Rise of Machine Learning Techniques
Submitted by grigby1 on Mon, 10/05/2020 - 2:11pm
Scalability
Neural networks
Newton method
nonconvex functions
optimisation
optimization
pubcrawl
Quasi-Newton methods
resilience
Resiliency
memory storage
security
Signal processing algorithms
storage management
Training
training responses
TRMinATR
Trust-region methods
trust-region minimization algorithm
Hessian matrices
computational complexity
computer architecture
computer theory
deep learning
Europe
gradient descent methods
gradient methods
Hessian approximations
approximation theory
Hessian matrix inversion
Human Factors
learning (artificial intelligence)
limited memory BFGS quasiNewton method
Limited-memory BFGS
Line-search methods
machine learning
matrix inversion
biblio
An Efficient Recommender System by Integrating Non-Negative Matrix Factorization With Trust and Distrust Relationships
Submitted by grigby1 on Mon, 10/05/2020 - 2:11pm
recommender system
user-item ratings
trust relationships
Task Analysis
Sparse matrices
social trust information
Social trust
social regularization method
security
Scalability
Resiliency
resilience
recommender systems
collaborative filtering
pubcrawl
optimization
nonnegative matrix factorization framework
MF-based recommenders
matrix factorization
Matrix decomposition
Linear programming
Human Factors
distrust relationships
convergence
computer theory
Complexity theory
biblio
Trust Management in Underwater Acoustic MANETs based on Cloud Theory using Multi-Parameter Metrics
Submitted by grigby1 on Mon, 10/05/2020 - 2:11pm
underwater acoustic communication
secure access
security
telecommunication security
terrestrial MANETs
threat identification
Trust Management Framework
trust model
uncertainty
Scalability
underwater acoustic MANETs
Underwater Acoustic Mobile Ad-hoc Network
underwater acoustic Mobile Ad-hoc NETworks
Underwater acoustics
underwater environment
Unified modeling language
Vulnerability Analysis
Identity management
Access Control
Ad hoc networks
cloud model
communication metrics
computer theory
cyber security
harsh underwater environments
Human Factors
802.11-based MANET
Measurement
mobile ad hoc networks
mobile computing
multiparameter metrics
pubcrawl
resilience
Resiliency
biblio
Entropy-based Fuzzy AHP Model for Trustworthy Service Provider Selection in Internet of Things
Submitted by grigby1 on Mon, 10/05/2020 - 2:11pm
trust metrics
pubcrawl
reputation models
resilience
Resiliency
Scalability
security
service oriented architecture
service-oriented architecture
multimetrics trust
trust model
trust scores
trust worthiness metrics
trust-based security mechanisms
trust-based service oriented architecture
trustworthy service provider selection
uncertainty
Entropy
Analytical Hierarchy
building-blocks
complex multicriteria decision making
Computational modeling
computer theory
decision criteria
Decision Making
EFAHP Model
analytic hierarchy process
entropy-based fuzzy AHP model
entropy-based fuzzy analytic hierarchy process
fuzzy set theory
Human Factors
Internet of Things
Multi-criteria Decision Making
multicriteria decision-making problem
biblio
On the Impact of Trusted Nodes in Resilient Distributed State Estimation of LTI Systems
Submitted by grigby1 on Mon, 10/05/2020 - 2:10pm
provably-correct distributed state estimation algorithm
trusted nodes
Trusted Computing
state estimation
set theory
sensors
security
Scalability
Robustness
resilient distributed state estimation
Resiliency
resilience
Redundancy
pubcrawl
attack-prone environment
NP-hard
Measurement
LTI systems
Linear systems
linear dynamical process
Human Factors
Heuristic algorithms
computer theory
computer network security
computational complexity
communication-link augmentation
attack-resilient algorithm
biblio
Collaborative Filtering Algorithm Based on Trust and Information Entropy
Submitted by grigby1 on Mon, 10/05/2020 - 2:10pm
Prediction algorithms
weighted information entropy
trust similarity
trust relationship
trust
time decay function
time decay
security
Scalability
robots
Resiliency
resilience
recommender systems
recommendation system
pubcrawl
collaboration
Pearson similarity
information entropy theory
information entropy
human trust
Human Factors
human computer interaction
Human behavior
filtering algorithms
Filtering
Entropy
computer theory
collaborative filtering algorithm
collaborative filtering
biblio
A trust-based game theoretical model for cooperative intrusion detection in multi-cloud environments
Submitted by grigby1 on Mon, 10/05/2020 - 2:10pm
Scalability
Human Factors
IDS approaches
individual detection accuracy increase
Intrusion Detection
multicloud environments
pubcrawl
resilience
Resiliency
higher detection accuracy
security
security of data
single cloud-based intrusion detection system
suspicious intrusions
trust
trustworthy IDS communities
untrusted IDS
computer theory
central agent
centralized architecture
Cloud Computing
cloud systems
Coalitional game theory
collaboration
complex computer systems
computer network security
Bayes methods
Cyber Attacks
Cyber-security
Detectors
f⊘yw⊘rds-Intrusion detection systems
Game Theoretical Model
game theory
Games
biblio
Research on Cloud Computing Security Evaluation Model Based on Trust Management
Submitted by grigby1 on Mon, 10/05/2020 - 2:10pm
Probability distribution
uncertainty
Trusted Computing
trust management mechanism
Trust management
subsequent cloud computing service
sharing applications
security of data
security assessment model
security
Scalability
Resiliency
resilience
quantifiable analysis
pubcrawl
Big Data trust management
information security
Human Factors
DS evidence theory method
DS evidence theory
data unification
Data Security
data credible quantification mechanism
computer theory
Computational modeling
cloud services
Cloud Security
cloud computing security evaluation model
cloud computing security
Cloud Computing
« first
‹ previous
1
2
3
next ›
last »